User contributions for Globalcyberalliance
From GCA ACT
Jump to navigationJump to search
23 October 2023
- 04:4604:46, 23 October 2023 diff hist +24 Category:Digital Currency Users No edit summary
- 04:2904:29, 23 October 2023 diff hist 0 N Category:Prevention Created blank page current
- 04:2904:29, 23 October 2023 diff hist 0 N Category:National CERTs Created blank page
- 04:1804:18, 23 October 2023 diff hist 0 N Category:Governments - US State - Local - Tribal - Territorial (SLTT) Created blank page
- 04:1604:16, 23 October 2023 diff hist 0 N Category:Decentralized Exchange (DEX) Use Created blank page
- 04:1604:16, 23 October 2023 diff hist 0 N Category:Cryptocurrency and Blockchain Security Awareness Education Created blank page
- 04:1304:13, 23 October 2023 diff hist 0 N Category:Cryptocurrency Risk Management Created blank page
- 04:1304:13, 23 October 2023 diff hist 0 N Category:Digital Currency Users Created blank page
- 04:1204:12, 23 October 2023 diff hist 0 N Category:Centralized Exchange (CEX) Account Protection Created blank page
- 04:1104:11, 23 October 2023 diff hist 0 N Category:CIS Controls - v8.0 Created blank page current
- 04:1004:10, 23 October 2023 diff hist 0 N Category:Beyond Simple Passwords Created blank page current
- 04:1004:10, 23 October 2023 diff hist 0 N Category:Being Cautious with Personal Information Created blank page
- 04:1004:10, 23 October 2023 diff hist 0 N Category:Additional Tips for Secure Digital Currency Use Created blank page
- 03:2603:26, 23 October 2023 diff hist 0 m Category:Small & Medium Sized Businesses Globalcyberalliance moved page Category:Small and Medium Sized Businesses to Category:Small & Medium Sized Businesses without leaving a redirect current
- 03:2503:25, 23 October 2023 diff hist +25 N Category:Maintenance (PR.MA) Created via script current
- 03:2503:25, 23 October 2023 diff hist +51 N Category:DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed Created via script current
- 03:2503:25, 23 October 2023 diff hist +33 N Category:RC.IM-2: Recovery strategies are updated Created via script current
- 03:2503:25, 23 October 2023 diff hist +41 N Category:ID.BE-4: Dependencies and critical functions for delivery of critical services are established Created via script current
- 03:2503:25, 23 October 2023 diff hist +49 N Category:ID.SC-5: Response and recovery planning and testing are conducted with suppliers and third-party providers Created via script current
- 03:2503:25, 23 October 2023 diff hist +42 N Category:PR.PT-5: Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations Created via script current
- 03:2503:25, 23 October 2023 diff hist +35 N Category:RS.CO-1: Personnel know their roles and order of operations when a response is needed Created via script current
- 03:2503:25, 23 October 2023 diff hist +35 N Category:RC.CO-1: Public relations are managed Created via script current
- 03:2503:25, 23 October 2023 diff hist +42 N Category:PR.PT-1: Audit or log records are determined, documented, implemented, and reviewed in accordance with policy Created via script current
- 03:2503:25, 23 October 2023 diff hist +51 N Category:DE.CM-4: Malicious code is detected Created via script current
- 03:2503:25, 23 October 2023 diff hist +51 N Category:DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events Created via script current
- 03:2503:25, 23 October 2023 diff hist +33 N Category:RC.IM-1: Recovery plans incorporate lessons learned Created via script current
- 03:2503:25, 23 October 2023 diff hist +25 N Category:Identity Management, Authentication and Access Control (PR.AC) Created via script current
- 03:2503:25, 23 October 2023 diff hist +41 N Category:ID.BE-2: The organization’s place in critical infrastructure and its industry sector is identified and communicated Created via script current
- 03:2503:25, 23 October 2023 diff hist +37 N Category:ID.AM-6: Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established Created via script current
- 03:2503:25, 23 October 2023 diff hist +68 N Category:PR.IP-7: Protection processes are improved Created via script current
- 03:2503:25, 23 October 2023 diff hist +31 N Category:ID.GV-3: Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed Created via script current
- 03:2503:25, 23 October 2023 diff hist +24 N Category:Anomolies and Events (DE.AE) Created via script current
- 03:2503:25, 23 October 2023 diff hist +39 N Category:PR.AT-5: Physical and cybersecurity personnel understand their roles and responsibilities Created via script current
- 03:2503:25, 23 October 2023 diff hist +51 N Category:DE.CM-2: The physical environment is monitored to detect potential cybersecurity events Created via script current
- 03:2503:25, 23 October 2023 diff hist +34 N Category:PR.DS-8: Integrity checking mechanisms are used to verify hardware integrity Created via script current
- 03:2503:25, 23 October 2023 diff hist +51 N Category:DE.CM-6: External service provider activity is monitored to detect potential cybersecurity events Created via script current
- 03:2503:25, 23 October 2023 diff hist +39 N Category:PR.AT-3: Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities Created via script current
- 03:2503:25, 23 October 2023 diff hist +42 N Category:PR.PT-2: Removable media is protected and its use restricted according to policy Created via script current
- 03:2503:25, 23 October 2023 diff hist +24 N Category:Security Continuous Monitoring (DE.CM) Created via script current
- 03:2503:25, 23 October 2023 diff hist +26 N Category:PROTECT (PR) Created via script current
- 03:2503:25, 23 October 2023 diff hist +41 N Category:DE.AE-3: Event data are collected and correlated from multiple sources and sensors Created via script current
- 03:2503:25, 23 October 2023 diff hist +42 N Category:PR.PT-4: Communications and control networks are protected Created via script current
- 03:2503:25, 23 October 2023 diff hist +38 N Category:RS.RP-1: Response plan is executed during or after an incident Created via script current
- 03:2503:25, 23 October 2023 diff hist +75 N Category:PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions Created via script current
- 03:2503:25, 23 October 2023 diff hist +25 N Category:Protective Technology (PR.PT) Created via script current
- 03:2503:25, 23 October 2023 diff hist +68 N Category:PR.IP-9: Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed Created via script current
- 03:2503:25, 23 October 2023 diff hist +37 N Category:ID.AM-1: Physical devices and systems within the organization are inventoried Created via script current
- 03:2503:25, 23 October 2023 diff hist +41 N Category:ID.BE-1: The organization’s role in the supply chain is identified and communicated Created via script current
- 03:2503:25, 23 October 2023 diff hist +51 N Category:DE.CM-1: The network is monitored to detect potential cybersecurity events Created via script current
- 03:2503:25, 23 October 2023 diff hist +75 N Category:PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties Created via script current